1 | -- | 21 | Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware |
22 | -- | 40 | Zeng Shou, Yue-bin Di, Xiao Ma, Rui-chao Xu, Heqiu Chai, Long Yin. The APT family classification system based on APT call sequences and attention mechanism |
41 | -- | 67 | Miao He, Nurmamat Helil. A lattice-based CP-ABE scheme with immediate attribute revocation |
68 | -- | 90 | Moumita Sahoo, Sabyasachi Samanta, Soumen Ghosh. An ensemble classification model for improved performance of phishing detection system |
91 | -- | 108 | Junjing Zhu, HongGang Lin. Method for botnet detection with small labelled samples based on graph neural network |
109 | -- | 146 | Xian Guo, Kai Zheng, Yongbo Jiang, Jing Wang, Junli Fang 0001. Security-enhanced machine learning framework based on PATE |
147 | -- | 158 | Orkhan Valikhanli. Detection of malware in ground control stations of unmanned aerial vehicles based on image processing |
159 | -- | 177 | Nabila Sehito, Shouyi Yang, Raja Sohail Ahmed Larik, Ghulam Raza, Safi Ullah. Analysis of outage probability and optimising secrecy capacity in physical layer security based on wireless cooperative relay networks |